FOSS ILS in Academic Libraries. A map of academic libraries using a FOSS ILS. Data from http://www.librarytechnology.org/libwebcats/ - Koha (yellow) - Evergreen (green) - OPALS (purple) - NewGenLib (red)
Mar. 01, 1995 By STEWART BRAND (editor of the Whole Earth Catalog, founder of The Well etc.) : "As Steven Levy chronicled in his 1984 book, Hackers: Heroes of the Computer Revolution, there were three generations of youthful computer programmers who deli
Today (24 March 2010) two computer security researchers, Christopher Soghoian and Sid Stamm, released a draft of a forthcoming research paper in which they present evidence that certificate authorities (CAs) may be cooperating with government agencies to
"Det ser ut att ljusna i världsekonomin. Trots det ökar serverlösheten dramatiskt i Sverige. Fler och fler företag inser nämligen att det finns pengar att tjäna på att lägga e-post, projektverktyg och andra IT-lösningar i ”Molnet”. Man betalar bara för så
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis
While Android may have the legal licensing to qualify as open source, it utterly fails on the equally important issues of transparency and community. Android basically gives you two options: Accept what Google gives you, or fork the entire codebase. Other
December 1, 2004. "Mr. Tenet, who retired in July as director of the CIA after seven years, warned that ...""I know that these actions will be controversial in this age when we still think the Internet is a free and open society with no control or accoun
The social potential embodied in Slashcode was available when Naomi Klein's January 2000 book No Logo: Taking Aim at the Brand Bullies became a sudden international best-seller. .. A book is a highly hierarchical and centralized form of communication - t
The gradual disappearance of open wireless networks is a tragedy of the commons, with a confusing twist of privacy and security debate. This essay explains why the progressive locking of wireless networks is harmful — for convenience, for privacy and for
The Contact Summit will take place October 20, 2011 at the Angel Orensanz Foundation in New York City. Doors open at 7:30am. The summit will commence promptly at 9:00am.